Abstract
It has been detected that the existing Differential Fault Analysis needs to modify the Advanced Encryption Standard for easy key retrieval process. The attack of DFA on the AES-128 requires a massive amount of faulty ciphertext pairs. Key retrieval using DFA attack on AES-128 requires minimal of 250 pairs of faulty cipher-text. This can be reduced to 14 to 16 pairs of faulty cipher-text samples in AES-192 bits and AES-256 bits. This was done by injecting faults randomly into the 11th cycle key which is saved in the Static RAM-Random Access Memory. Researches are made on methods for finding the initial key and that has only been suggested in AES-128. This paper puts forward a system which, intends to induce DFA attack on AES-192 and AES-256 algorithms with less number of faulty cipher-texts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abraham, N.E.: FPGA implementation of SubBytes & inverse SubBytes for AES algorithm. Int. J. Sci. Res. Dev. (IJSRD) (2013)
Patel, R., Kanjariya, S.: Design of parallel advanced encryption standard (AES) algorithm. Int. J. Res. Comput. Commun. Technol. 4, 219–222 (2015)
Giraud, C.: DFA on AES. Springer, Berlin (2005)
Liao, N., Cui, X., Liao, K., Wang, T., Yu, D., Cui, X.: Improving DFA attacks on AES with unknown and random faults. Sci. China Inf. Sci. 60, 042401 (2016)
Aromoon, U.: An AES cryptosystem for small scale network. In: Third Asian Conference on Defence Technology (3rd ACDT). IEEE (2017)
Wang, P., Hao, L.: A novel differential fault analysis on AES-128. IEEE (2011)
Patranabis, S., Chakraborty, A., Mukhopadhyay, D., Chakrabarti, P.P.: Fault space transformation: a generic approach to counter differential fault analysis and differential fault intensity analysis on AES-like block cipher. IEEE Trans. Inf. Sec. 12, 1092–1102 (2016)
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. Springer, Berlin (1997)
Bai, K., Wu, C.: An AES-like cipher and its white-box implementation. Comput. J. 59, 1054–1065 (2016)
Barenghi, A., Hocquet, C., Bol, D.: A combined design-time/test-time study of the vulnerability of sub-threshold device to low voltage fault attacks. IEEE Trans. Emerg. Top. Comput. 2, 107–118 (2014)
Haq, S.U., Masood, J., Majeed, A., Aziz, U.: Bulk encryption on GPUs
Floissac, N., L’Hyver, Y.: From AES-128 to AES-192 and AES-256 how to adapt differential fault analysis attacks on key expansion. In: 2011 Workshop on Fault Diagnosis and Tolerance on Cryptography (2011)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kiranmayee, T.S., Maniraj, S.P., Thakur, A., Bhagyashree, M., Gupta, R. (2020). Analyzing DFA Attack on AES-192. In: Pandian, A.P., Senjyu, T., Islam, S.M.S., Wang, H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-24643-3_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24642-6
Online ISBN: 978-3-030-24643-3
eBook Packages: EngineeringEngineering (R0)